通信学报

• 学术论文 • 上一篇    下一篇

基于Montgomery算法安全漏洞的SPA攻击算法

甘刚,王敏,杜之波,吴震   

  1. 成都信息工程学院 网络工程学院,四川 成都 610225
  • 出版日期:2013-08-25 发布日期:2013-12-16
  • 基金资助:
    “十二五”国家密码发展基金资助项目(MMJJ201101022);四川省科技支撑计划基金资助项目(2011GZ0170);四川省教育厅重点科研基金资助项目(13ZA0091)

Simple power analysis attack against cryptosystemsbased on Montgomery algorithm

  • Online:2013-08-25 Published:2013-12-16

摘要: 公钥密码体制的算法大多基于有限域的幂指数运算或者离散对数运算。而这些运算一般会采用Montgomery算法来降低运算的复杂度。针对Montgomery算法本身存在可被侧信道攻击利用的信息泄露问题,从理论和实际功耗数据2方面分析了Montgomery算法存在的安全漏洞,并基于该漏洞提出了对使用Montgomery算法实现的模幂运算进行简单能量分析(SPA, simple power analysis)攻击算法。利用该算法对实际模幂运算的能量曲线进行了功耗分析攻击。实验表明该攻击算法是行之有效的。

Abstract: The Montgomery algorithm is widely used to reduce the computational complexity of large integer modular exponentiation. The SPA (simple power analysis) attacks against public-key cryptosystems based on Montgomery algorithm implementation were presented by exploitation of the inherent security vulnerability which that sensitive information leakage could be used by side-channel attack. The chosen-message SPA attacks were focused on, which enhance the differences of operating wave-forms between multiplication and squaring correlated to the secret key by using the input of particular messages. In particular, a SPA attack against RSA cryptosystem was showed based on large integer modular exponentiation. The results show that the attack algorithm is correct and effective.

No Suggested Reading articles found!